Search Results - Reade (name)
Suggested Topics within your search.
Suggested Topics within your search.
- History 3
- Politics and government 3
- Design and construction 2
- Materials 2
- Solar cells 2
- ActionScript (Computer program language) 1
- Administrative agencies 1
- Bibliographers 1
- Books 1
- Chinese characters 1
- Classification 1
- Commando operations 1
- Commando troops 1
- Communalism 1
- Computer animation 1
- Computer networks 1
- Computer simulation 1
- Computer software 1
- Conversation and phrase books 1
- Data processing 1
- Dictionaries 1
- Distributed processing 1
- Documentation 1
- Drugs 1
- Economic conditions 1
- Economic development 1
- Electronic data processing 1
- Endocrine System Diseases 1
- English 1
- English fiction 1
-
1
Pebbles on the shore [by] Alpha of the plough
Published 2004“…On choosing a name -- On letter-writing -- On reading in bed -- On cats and dogs -- "W.G." -- On seeing visions -- On black sheep -- The village and the war -- On rumour -- On umbrella morals -- On talking to one's self -- On Boswell and his mir…”
Get full text
Rights
Electronic eBook -
2
Transportation A Global Supply Chain Perspective
Published 2024Table of Contents: “…Issues and Challenges for Global Supply Chains -- Suggested Readings for Part III -- Glossary -- Name Index -- Subject Index.…”
Book -
3
The sword of ambition bureaucratic rivalry in medieval Egypt /cAbū ʻAmr ʻUthmān ibn Ibrahim al-Nabulusi al-Miṣrī ; edited and translated by Luke B. Yarbrough ; Foreword by Sherma...
Published 2016Table of Contents: “…Intro -- Letter from the General Editor -- Foreword -- Abbreviations -- Acknowledgments -- Introduction -- A Note on the Text -- Notes to the Introduction -- The Sword of Ambition -- Notes -- The Fatimid Caliphs in Egypt -- The Ayyubid Sultans in Egypt -- Glossary of Names and Terms -- Bibliography -- Further Reading -- About the NYU Abu Dhabi Institute -- About this E-book -- Titles Published by the Library of…”
Book -
4
Qualitative data analysis practical strategies
Published 2013Table of Contents: “…Foundations for thinking and working qualitatively -- Designing for analysis -- Managing and preparing data for analysis -- Read, reflect, and connect: initial explorations of data -- Codes and coding: principles and practice -- Naming, organising, and refining codes -- Alternative approaches to breaking open and connecting data -- Describing, evolving, and theorising concepts -- Comparative analyses as a means of furthering analysis -- Relational analyses -- If ... then ... is it because? …”
Book -
5
Healing drugs the history of pharmacology
Published 1992Table of Contents: “…Simples and leeches: Drugs from plants -- Drugs from the animal kingdom -- Plants of joy and sorrow: Morphine -- Codeine -- Heroin -- Cocaine -- Bilious pills and humbub oil: Patent medicines -- Move toward science -- First laws to regulate drugs -- Magic bullet: Cure for syphilis -- Sulfa drugs: First sulfa drug -- Deadly sulfa drug -- Penicillin, the wonder drug: Discovery -- Wonder drug -- First tests on sick people -- American team -- Mail-in mold: Chloromycetin -- Aureomycin -- Streptomycin -- Terramycin -- Cyclosporine -- Banting's summer project -- Success with extract X -- More insulin -- Recombinant DNA for new drugs -- Human growth hormone -- Vaccines and viruses: First vaccinations -- Rabies vaccine -- Viruses -- Polio -- Salk's vaccine -- Sabin's vaccine -- Starting from scratch: Screening for drugs -- Animal testing -- Transgenic mice -- Computer-designed drugs -- Who says it's safe: FDA standards -- Human trials -- No-name drugs -- Orphan drugs -- Back to the future: Cancer drug in the forest -- Ancient medicine made new -- Return of diseases -- Glossary -- Further reading -- Index.…”
Book -
6
-
7
-
8
-
9
Business lessons from the edge learn how extreme athletes use intelligent risk-taking to succeed in business /
Published 2009Table of Contents: “…: welcome humility -- Don't bail your board : exude integrity -- Crash alone or win with a voice in your head : to be a top performer, get coached -- Give your head some air : liberate your ideas -- Spawn new tricks : be a stimulus for passion -- Find out what your gold medal is for : define your goals -- Climb as soon as the weather breaks : be ready to seize opportunity -- Roll with the fall : practice resilience -- Stretch if you're too short : never give up -- Think like a pilot : focus yields efficiency -- Team leadership -- Team elite is not just a name : your team is critical -- Why doom yourself to failure? …”
NetLibrary
Click for information on Adobe Digital Editions version
Click for information on Adobe Digital Editions version
Click for information on Mobipocket Reader version
Image
MyiLibrary
ebrary
Electronic eBook -
10
-
11
Encountering Asian new horizon contesting and negotiating in fluid transitions : the work of the 2012-2013 API fellows
Published 2015Table of Contents: “…Engendering Lives: Being Women Do Make Unique Differences -- Gender Challenge: The Economic Resilence of a Coastal Community Household -- From Asahi To Abucay: The Video Archive Project -- The Dynamics and Elan of Ijtihad to Provide New readings of Islamic Laws and Customary Practices on Womens Human Rights -- Hidden Faces, Unheard Voices: Women Oil Palm Plantation Workers in the Philippines and Indonesia -- 2. …”
Book -
12
Hacking with kali practical penetration testing techniques
Published 2014Table of Contents: “…ch. 1 Introduction -- Book Overview and Key Learning Points -- Book Audience -- Diagrams, Figures, and Screen Captures -- Welcome -- Penetration Testing Lifecycle -- Terms -- Kali History -- References -- ch. 2 Download and Install Kali Linux -- Chapter Overview and Key Learning Points -- Kali Linux -- System Information -- Downloading Kali -- Hard Drive Installation -- Thumb Drive Installation -- SD Card Installation -- Summary -- ch. 3 Software, Patches, and Upgrades -- Chapter Overview and Key Learning Points -- APT Package Handling Utility -- Debian Package Manager -- Tarballs -- A Practical Guide to Installing Nessus -- Conclusion -- ch. 4 Configuring Kali Linux -- Chapter Overview and Key Learning Points -- About This Chapter -- The Basics of Networking -- Using the Graphical User Interface to Configure Network Interfaces -- Using the Command Line to Configure Network Interfaces -- Using the GUI to Configure Wireless Cards -- Web Server -- FTP Server -- SSH Server -- Configure and Access External Media -- Updating Kali -- Upgrading Kali -- Adding a Repository Source -- Summary -- ch. 5 Building a Penetration Testing Lab -- Chapter Overview and Key Learning Points -- Before Reading This Chapter: Build a Lab -- Building a Lab on a Dime -- Metasploitable2 -- Extending Your Lab -- The Magical Code Injection Rainbow -- ch. 6 Introduction to the Penetration Test Lifecycle -- Chapter Overview and Key Learning Points -- Introduction to the Lifecycle -- Phase 1 Reconnaissance -- Phase 2 Scanning -- Phase 3 Exploitation -- Phase 4 Maintaining Access -- Phase 5 Reporting -- Summary -- ch. 7 Reconnaissance -- Chapter Overview and Key Learning Points -- Introduction -- Start with the Targets Own Website -- Website Mirroring -- Google Searches -- Google Hacking -- Social Media -- Job Sites -- DNS and DNS Attacks -- Query a Name Server -- Zone Transfer -- Reference -- ch. 8 Scanning -- Chapter Overview and Key Learning Points -- Introduction to Scanning -- Understanding Network Traffic -- NMAP the King of Scanners -- Selecting Ports -- HPING3 -- Nessus -- Summary -- ch. 9 Exploitation -- Chapter Overview and Key Learning Points -- Introduction -- An Overview of Metasploit -- Accessing Metasploit -- Web Server and Web Application Exploitation -- Conclusion -- ch. 10 Maintaining Access -- Chapter Overview and Key Learning Points -- Introduction -- Terminology and Core Concepts -- Backdoors -- Keyloggers -- Summary -- Reference -- ch. 11 Reports and Templates -- Chapter Overview and Key Learning Points -- Reporting -- Presentation -- Report and Evidence Storage -- Summary.…”
Book -
13
-
14
-
15
-
16
ActionScript 3.0 bible
Published 2008Table of Contents: “…Part 2: Working With ActionScript 3.0 Objects -- 6: Using strings -- Summary -- 7: Working with numbers and math -- Understanding numeric types -- Using numbers in ActionScript -- Manipulating numbers -- Performing arithmetic -- Performing trigonometric calculations -- Generating randomness -- Manipulating dates and times -- Summary -- 8: Using arrays -- Array basics -- Converting arrays to strings -- Adding and removing items from an array -- Slicing, splicing, and dicing -- Iterating through the items in an array -- Searching for elements -- Reordering your array -- Applying actions to all elements of an array -- Alternative types of arrays -- Summary -- 9: Using objects -- Working with objects -- Using objects as associative arrays -- Using objects for named arguments -- Using objects as nested data -- Summary -- 10: Working with XML -- Getting started with XML in ActionScript -- Accessing values with E4X -- Constructing XML objects -- Converting to and from strings -- Loading XML data from external sources -- Using namespaces -- Working with comments and processing instructions -- Setting options for the XML class -- Summary -- 11: Working with regular expressions -- Introducing regular expressions -- Applying regular expressions -- Constructing expressions -- Understanding regular expression flags -- Constructing advanced expressions -- Using the RegExp class -- Summary -- Part 3: Working With The Display List -- 12: Understanding the Flash Player 9 display list -- Display list -- DisplayObject and DisplayObjectContainer -- Introducing the graphics object -- Working with the stage -- InteractiveObject and SimpleButton -- Shape -- Creating user interface elements with Sprite -- Working with the MovieClip -- Examples using the display list -- Summary -- 13: Working with DisplayObjects in Flash CS3 -- Creating symbols within Flash CS3 -- Accessing embedded graphic classes -- Summary -- 14: Printing -- Why print from Flash? …”
Book -
17
-
18
-
19
-
20


